Security of Context Transfer in Future Wireless Communications
نویسندگان
چکیده
Page 1 (9) Abstract—New security considerations arise if context transfer is to be employed in the Ambient Network architecture. In this paper we investigate, new security requirements and considerations for context transfer in Ambient Networks, the transfer of security state information, the provisioning of security support of session mobility using context transfer, and finally an analysis of security issues of context transfer in homogeneous and heterogeneous environments.
منابع مشابه
A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملTowards Wireless Security without Computational Assumptions —An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel
Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic tools that do not rely on computational assumptions. In this paper, w...
متن کاملFrom E-learning to Ubiquitous Learning; Theoretical Principles
Background: Because of approaches to learning in every place and at any time, ubiquitous learning with knowledge of the context and framework, and due to the development of wireless technologies and sensors, the learning process has changed. Mobile learning and ubiquitous learning as models of e-learning that refer to the acquisition of knowledge, attitudes and skills through wireless technolog...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004